Threats, Attacks, and Vulnerabilities (1) Flashcards
John is analyzing strange behavior on computers in his network. He believes there is malware on the machines. The symptoms include strange behavior that persists, even if he boots the machine to a Linux Live CD. What is the most likely cause?
Ransomware
Boot sector virus
Rootkit
Boot sector virus
The correct answer is a boot sector virus, which is one that will affect the boot sector of the hard drive. Thus, what operating system you boot to is irrelevant
Ahmed is a sales manager with a major insurance company. He has received an email that is encouraging him to click on a link and fill out a survey. He is suspicious of the email, but it does mention a major insurance association, and that makes him think it might be legitimate. Which of the following best describes this attack?
Phishing
Social engineering
Spear phishing
Spear phishing
The correct answer is spear phishing. Spear phishing is targeted to a specific group, in this case insurance professionals. Attackers can find individuals from public sources to target. This is known as open source intelligence
You are a security administrator for a medium-sized bank. You have discovered a piece of software on your bank’s database server that is not supposed to be there. It appears that the software will begin deleting database files if a specific employee is terminated. What best describes this?
Worm
Logic bomb
Trojan horse
Logic bomb
A logic bomb is malware that performs its malicious activity when some condition is met. Option A is incorrect because a worm is malware that self-propagates
You are responsible for incident response at Acme bank. The Acme bank website has been attacked. The attacker used the login screen, but rather than enter login credentials, he or she entered some odd text: ‘ or ‘1’ = ‘1. What is the best description for this attack?
Cross-site scripting
Cross-site request forgery
SQL injection
SQL injection
The text shown is the classic example of a basic SQL injection to log in to a site
Juanita is a network administrator for a small accounting firm. The users on her network are complaining of slow connectivity. When she examines the firewall logs, she observes a large number of half-open connections. What best describes this attack?
DDoS
SYN flood
Buffer overflow
SYN flood
Half-open connections are the hallmark of a SYN flood
Frank is deeply concerned about attacks to his company’s e-commerce server. He is particularly worried about cross-site scripting and SQL injection. Which of the following would best defend against these two specific attacks?
Encrypted web traffic
Filtering user input
A firewall
Filtering user input
The primary and best way to defend against the attacks mentioned is filtering user input
You are responsible for network security at Acme Company. Users have been reporting that personal data is being stolen when using the wireless network. They all insist they only connect to the corporate wireless access point (WAP). However, logs for the WAP show that these users have not connected to it. Which of the following could best explain this situation?
Session hijacking
Clickjacking
Rogue access point
Rogue access point
If users have been connecting but the WAP does not show them connecting, then they have been connecting to a rogue access point. This could be the cause of an architecture and design weakness such as a network without segmentation and control of devices connecting to the network
What type of attack depends on the attacker entering JavaScript into a text area that is intended for users to enter text that will be viewed by other users?
SQL injection
Clickjacking
Cross-site scripting
Cross-site scripting
Cross-site scripting involves entering a script into text areas that other users will view
A sales manager at your company is complaining about slow performance on his computer. When you thoroughly investigate the issue, you find spyware on his computer. He insists that the only thing he has downloaded recently was a freeware stock trading application. What would best explain this situation?
Logic bomb
Trojan horse
Rootkit
Trojan horse
A Trojan horse wraps a malicious program to a legitimate program. When the user downloads and installs the legitimate program, they get the malware
Your company outsourced development of an accounting application to a local programming firm. After three months of using the product, one of your accountants accidently discovers a way to log in and bypass all security and authentication. What best describes this?
Logic bomb
Trojan horse
Backdoor
Backdoor
A backdoor is a method for bypassing normal security and directly accessing the system
Teresa is the security manager for a mid-sized insurance company. She receives a call from law enforcement, telling her that some computers on her network participated in a massive denial-of-service (DoS) attack. Teresa is certain that none of the employees at her company would be involved in a cybercrime. What would best explain this scenario?
It is a result of social engineering.
The machines all have backdoors.
The machines are bots.
The machines are bots.
The machines in her network are being used as bots, and the users are not aware that they are part of a DDoS attack
Mike is a network administrator with a small financial services company. He has received a popup window that states his files are now encrypted and he must pay .5 bitcoins to get them decrypted. He tries to check the files in question, but their extensions have changed, and he cannot open them. What best describes this situation?
Mike’s machine has a rootkit.
Mike’s machine has ransomware.
Mike’s machine has a logic bomb.
Mike’s machine has ransomware.
This is a classic example of ransomware
Terrance is examining logs for the company e-commerce web server. He discovers a number of redirects that cannot be explained. After carefully examining the website, he finds some attacker performed a watering hole attack by placing JavaScript in the website and is redirecting users to a phishing website. Which of the following techniques would be best at preventing this in the future?
An active IDS/IPS
Checking buffer boundaries
Checking user input
Checking user input
The primary method for stopping both cross-site scripting and SQL injection is to check or filter user input
What type of attack is based on sending more data to a target variable than the data can actually hold?
Bluesnarfing
Buffer overflow
Bluejacking
Buffer overflow
This is the description of a buffer overflow
You have been asked to test your company network for security issues. The specific test you are conducting involves primarily using automated and semiautomated tools to look for known vulnerabilities with the various systems on your network. Which of the following best describes this type of test?
Vulnerability scan
Penetration test
Security audit
Vulnerability scan
Vulnerability scan uses automated tools such as Nessus and Microsoft Baseline Security Analyzer to find known vulnerabilities